Skip to main content

Malware Architectural View with Performance Analysis in Network at Its Activation State

  • Conference paper
  • First Online:
  • 876 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 768))

Abstract

Malware is an international issue which results in the loss of integrity, security, and authenticity. Some malwares work autonomously whereas some malware use a host and some malware change their identity each time. Researchers are constantly working for the defense mechanism. This paper focuses to analyze malware architecture to give a detailed study of malware which can be helpful to design a strong defense mechanism. Although many authors analyzed and classified the malwares in several categories, this paper classifies malware into four categories as per their architecture at the time of infection and discusses the mechanism behind the malware architectures. This paper also observed the performance of network at the time of infection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kramer, S., Bradfield, J.C.: A general definition of malware. J. Comput. Virol. 6, 105–114 (2010). https://doi.org/10.1007/s11416-009-0137-1

    Article  Google Scholar 

  2. Cisco 2017 Midyear Cybersecurity Report, https://www.automation.com/pdf_articles/cisco/Cisco_2017_MCR_Embargoed_til_072017_5_AM_PT_8_AM_ET.pdf

  3. https://msdn.microsoft.com/en-IN/library/ms809762.aspx

  4. Cohen, F.: Computer Viruses Theory and Experiments. Elsevier Science Publishers B.V., North Holand (1987)

    Google Scholar 

  5. Ramilli, M., Bishop M.: Multi-Stage Delivery of Malware, pp 91–99, IEEE (2010)

    Google Scholar 

  6. Yoo, I.S., Ultes-Nitsche, U.: Non-signature based virus detection-Towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2, 163–186 (2006). https://doi.org/10.1007/s11416-006-0013-1

    Article  Google Scholar 

  7. Hardikar M.A.: MALWARE 101—VIRUSES. SANS Institute InfoSec Reading Room (2008) https://www.sans.org/reading-room/whitepapers/incident/malware-101-viruses-32848

  8. Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley, Boston (2005)

    Google Scholar 

  9. http://www.webopedia.com/TERM/A/Appending_Virus.html

  10. https://www.techopedia.com/definition/34/appending-virus

  11. Wilensky, U.: NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (1999) http://ccl.northwestern.edu/netlogo/

  12. Stonedahl, F., Wilensky, U.: NetLogo Virus on a Network model. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (2008) http://ccl.northwestern.edu/netlogo/models/VirusonaNetwork

  13. Martcheva M.: Introduction to Epidemic Modeling. An Introduction to Mathematical Epidemiology, ISBN: 978-1-4899-7611-6 (2015)

    Google Scholar 

  14. Sneha, S., Malathi, L., Saranya, R.: A survey on malware propagation analysis and prevention model. Int. J. Adv. Technol. (2015). https://doi.org/10.4172/0976-4860.1000148

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sisira Kumar Kapat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kapat, S.K., Tripathy, S.N. (2019). Malware Architectural View with Performance Analysis in Network at Its Activation State. In: Mallick, P., Balas, V., Bhoi, A., Zobaa, A. (eds) Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-13-0617-4_20

Download citation

Publish with us

Policies and ethics